M Seidl, A Schenk, C Stierstorfer… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
A framework is proposed that allows for a joint description and optimization of both binary polar coding and 2 m-ary digital pulse-amplitude modulation (PAM) schemes. For the latter …
WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
E Marshakov, G Balitskiy, K Andreev… - 2019 IEEE 90th …, 2019 - ieeexplore.ieee.org
Massive machine-type communications (mMTC) is one of the key application scenarios for future 5G networks. In the literature, this problem is known as unsourced random access. We …
A polar coding scheme is proposed for reliable communication over channels with bit- interleaved coded modulation (BICM). In an ideal information-theoretic model, BICM …
Polar codes are introduced for discrete memoryless broadcast channels. For m-user deterministic broadcast channels, polarization is applied to map uniformly random message …
This paper presents polar coding schemes for the two-user discrete memoryless broadcast channel (DM-BC) which achieve Marton's region with both common and private messages …
R Mori, T Tanaka - IEEE Transactions on Information Theory, 2014 - ieeexplore.ieee.org
Polarization phenomenon over any finite field Fq with size q being a power of a prime is considered. This problem is a generalization of the original proposal of channel polarization …
Y Li, J Dai, Z Si, K Niu, C Dong, J Lin… - China …, 2022 - ieeexplore.ieee.org
Unsourced multiple access (UMA) is a multi-access technology for massive, low-power, uncoordinated, and unsourced Machine Type Communication (MTC) networks. It ensures …
YP Wei, S Ulukus - IEEE Journal on Selected Areas in …, 2015 - ieeexplore.ieee.org
Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to achieve information-theoretic secrecy is an important …